Analysis
-
max time kernel
144s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 21:01
Static task
static1
Behavioral task
behavioral1
Sample
435358d2b47cfed02e4abb2b3adb75aa_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
435358d2b47cfed02e4abb2b3adb75aa_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
435358d2b47cfed02e4abb2b3adb75aa_JaffaCakes118.dll
-
Size
128KB
-
MD5
435358d2b47cfed02e4abb2b3adb75aa
-
SHA1
ff17d06766836171bab0c155716acc2cab7abf52
-
SHA256
664e5da27778f359252a16dd945f28b19d6c77aaecb2a360414f3d9e5fdd761f
-
SHA512
2f74170cdd02c497b016b026e5273f9cf89ef09f3d0e538d6cefeac83fe05805d70e2bd8e24bfb4b0bcb046dff63e58e158f43bb475febfc207b948051669242
-
SSDEEP
3072:IY1mAEmTj/J1Np9NKPw6bFy9iHagtXZCwf2U3OL5PFn0wcccccccc:IY1mdWNpP+I0H3lz2U30PFn0wccccccz
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 2 2964 rundll32.exe 3 2632 rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\{BA14709E-934A-40AA-A65E-BD006E86CFF0} = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\{BA14709E-934A-40AA-A65E-BD006E86CFF0}\\6f9e.dll\",DllGetClassObject secret 14791" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2964 rundll32.exe 2632 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2964 wrote to memory of 2632 2964 rundll32.exe 31 PID 2964 wrote to memory of 2632 2964 rundll32.exe 31 PID 2964 wrote to memory of 2632 2964 rundll32.exe 31 PID 2964 wrote to memory of 2632 2964 rundll32.exe 31 PID 2964 wrote to memory of 2632 2964 rundll32.exe 31 PID 2964 wrote to memory of 2632 2964 rundll32.exe 31 PID 2964 wrote to memory of 2632 2964 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\435358d2b47cfed02e4abb2b3adb75aa_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\435358d2b47cfed02e4abb2b3adb75aa_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\{BA14709E-934A-40AA-A65E-BD006E86CFF0}\6f9e.dll",DllGetClassObject secret 147913⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5435358d2b47cfed02e4abb2b3adb75aa
SHA1ff17d06766836171bab0c155716acc2cab7abf52
SHA256664e5da27778f359252a16dd945f28b19d6c77aaecb2a360414f3d9e5fdd761f
SHA5122f74170cdd02c497b016b026e5273f9cf89ef09f3d0e538d6cefeac83fe05805d70e2bd8e24bfb4b0bcb046dff63e58e158f43bb475febfc207b948051669242